{"vulnerability": "cve-2024-43064", "sightings": [{"uuid": "b94405ff-65d8-4f9f-bfd9-ef98a67431ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5840", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43064\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU.\n\ud83d\udccf Published: 2025-01-06T10:33:21.864Z\n\ud83d\udccf Modified: 2025-02-28T06:09:02.181Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html", "creation_timestamp": "2025-02-28T06:25:57.000000Z"}, {"uuid": "86d4dd08-715c-4a7c-a87b-d0daa3a9708e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "97a807f8-f64d-4aba-8e86-1dc0bc5383a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113781107563141439", "content": "", "creation_timestamp": "2025-01-06T11:12:00.081056Z"}, {"uuid": "7b1c0e15-147e-4499-8406-7964bc292f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2z24gva622", "content": "", "creation_timestamp": "2025-01-06T11:15:49.454997Z"}, {"uuid": "bc07c6af-9be3-4d36-803f-8c61b9e748af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf32kw5wpz2i", "content": "", "creation_timestamp": "2025-01-06T11:43:07.136242Z"}, {"uuid": "a19fc64c-2ce4-42e7-b46b-9e9f5bfdf471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://t.me/cvedetector/14344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43064 - VMware ESXi GPU Acceleration Vulnerability - Unchecked Resource Consumption\", \n  \"Content\": \"CVE ID : CVE-2024-43064 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:44:50.000000Z"}]}